The number of people who use Facebook on a daily basis is staggering.Read More
Recent studies have shown differing pictures of the Internet landscape, with some pointing to enhanced online client precautions and others citing an increased number of holes in server security.
Video post based on my interview* with Stuart Sumner of Computing – Part 1. What enterprises need to consider as large numbers of staff prepare to work away from the office. A large proportion of staff are set to work remotely this summer as the Olympic Games disrupt the UK’s transport networks. In a recent…Read More
Video post based on Trend Micro interviews at the Mobile Convention Amsterdam 2012 – Part 2. PREVIOUS: BYOD advice for mobile users: have you thought about security? An increasing number of companies are opening corporate networks and data to consumer mobile technology. The resulting trend, usually referred as the Consumerization of enterprise mobility, assumes even…Read More
Video post based on Trend Micro interviews at the Mobile Convention Amsterdam 2012 – Part 1. We all love our smartphones and tablets. And we all love those little mobile apps that make our devices so unique, useful, and fun. But have you ever thought about how safe they are? Should you trust your smartphone…Read More
Video series based on Trend Micro session* at the Mobile World Congress 2012. PREVIOUS: Day 4 – Mobile security matters […] What is the recommendation? What is the right approach eventually to try to leverage the business value that in fact exists in consumerization, without really exposing the company to all the risks in terms…Read More
Video series based on Trend Micro session* at the Mobile World Congress 2012. PREVIOUS: Day 3 – BYOD challenges for corporate IT […] What are the top concerns? So when we ask to IT managers: “in approaching BYOD, in approaching consumerization, what is your number one concern?” Constantly, every single time we ask, security seems…Read More
Video series based on Trend Micro session* at the Mobile World Congress 2012. PREVIOUS: Day 2 – Consumerization is real […] There are three dimensions in the problem. I’d like you to think about this because this is a real challenge for IT. Security is definitely one of the problems. Consumer technology is great. It’s…Read More
Business executives that insist they are above the regulations imposed by their IT department may be doing more damage than they know.
Social media giant Twitter is taking the fight to the next level, and surprisingly some hackers are stepping up to help them.